General

  • Target

    accstealmethod.exe

  • Size

    62KB

  • MD5

    be0cc25d8da84576311f90d6cba01e6b

  • SHA1

    5eade02d6db5aeede6e1b2c1672d763ce135529f

  • SHA256

    53bcd30d46a79c13f0e01ea5979827756b797a1c619f032d706c4652512daf0a

  • SHA512

    6274eed3e1903bb3af8f5a8081b75430adcc44aa6f0b313548cd69374fb381c33721a11cdb134f2f0839ea4620ff732873c90ee5707dd6b404b1d3c26bb1dead

  • SSDEEP

    1536:vllMUanyiNz2mrqbbi4Gstq6n3OxtIiq:vYSXmrqbb1xOxtIp

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7000

Attributes
  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • accstealmethod.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections